OT Security Challenges and Solutions for Critical Infrastructure Protection

Critical infrastructure systems, such as power plants, water treatment plants, transportation networks, and factories, depend on operational technology (OT) to work. OT systems are designed to manage physical devices and processes, while traditional IT systems primarily focus on protecting data and information. Because of this difference, OT security is complex, especially as OT networks are increasingly linked to IT networks, making them more vulnerable to cyber threats.

AI Workload Discovery: How to Find Every AI Agent Running in Your Clusters

A CISO at a mid-sized SaaS company pulls her platform lead aside after a board meeting. One question: “Do we have AI agents running in production?” The lead pauses. He knows the data science team has been experimenting with LangChain. He remembers a conversation about a customer-support pilot. He thinks there might be an inference server in staging that got promoted last quarter.

What cyber conflict reveals about power and doctrine, with Allie Mellen

Cyber conflict is easiest to misread when we treat it as an isolated technical event. In this episode of Chasing Entropy, Dave Lewis speaks with analyst and author Allie Mellen about her book Code War and why the cyber strategies of the United States, China, and Russia make more sense when viewed through the lens of history, doctrine, and political intent.

Project Glasswing. What Anthropic's Mythos Means for Cybersecurity

What happens when an AI model can find more vulnerabilities in a day than a red team could find in a year? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I’m Jim and in this episode, I’m joined by Martin Voelk, penetration tester and AI red teamer, and Jonathan Care, lead analyst at KuppingerCole covering AI and cybersecurity.

AI Workload Security for Healthcare: What CISOs Need to Prove Under HIPAA

A patient calls your privacy office and requests an accounting of every disclosure of her PHI made outside treatment, payment, and healthcare operations over the past six years. This is her right under HIPAA. Your privacy officer pulls the EHR disclosure log. It is complete through the day your organization deployed its first production AI agent.

Built for MSPs: Is Your Security Ready for Today's Threats?

Managed service providers are under more pressure than ever—protecting multiple clients, managing growing toolsets, and responding to increasingly sophisticated cyber threats. But fragmented solutions, alert fatigue, and limited visibility can slow you down and impact the service your clients rely on. Today’s MSPs need more than just more tools.

CrowdStrike Falcon Cloud Security Delivered 264% ROI Through Unified Cloud Protection

Many modern cloud security challenges come down to visibility. The complexity of modern environments, the deluge of alerts, and the lack of relevant context make it difficult for security teams to identify and prioritize threats — and easy for adversaries to slip through undetected.

Cyberhaven Now Transacts on All Three Major Cloud Marketplaces

In enterprise software, winning a deal is not just about product fit. The buying process matters just as much. Even when a customer is committed to moving forward, procurement friction can slow or stall a deal. New vendor setup, contract reviews, billing workflows, approval chains, and budget constraints all add complexity that extends timelines and increases the risk of deals falling apart. That is why procurement flexibility is not a back-end operational concern. It is a customer experience issue.